[1]http://hacking4defense.stanford.edu/dodic-problems.html "National Security Agency (NSA) To be provided" This incubator for contracted solutions to whatever has provided an world rw google doc for helping Stanford students organize into participatory groups. [2]https://docs.google.com/spreadsheets/d/1oXvCSrFzr2PoIDvOmQPaloJN_JxX FpwXNFluYATTaFw/edit?usp=sharing *Don't do anything disruptive here. +1 to the Palantir employees who are already in it to win it. Perhaps the rest of the project will be conducted on world r/w google drive? -Travis ---------- Forwarded message ---------- From: Yosem Companys <[3]companys@stanford.edu> Date: Mon, Jan 18, 2016 at 8:55 PM Subject: [liberationtech] MS&E 297: Hacking for Defense (New Course Spring 2016) To: Liberation Technologies <[4]liberationtech@lists.stanford.edu> Cc: Kimberly Diane Chang <[5]kdchang@stanford.edu> From: Kimberly Diane Chang <[6]kdchang@stanford.edu> MS&E 297 - Hacking for Defense Solving National Security Issues with the Lean Launchpad Interested in Entrepreneurship? Innovating at speed? Helping to make the world a better place? Working closely with members of the military and government to solve real, important problems? Then consider applying for MS&E 297 - Hacking for Defense. A new class in Spring 2016 with a teaching team led by Steve Blank and including Tom Byers (Professor MS&E), Joe Felter (CISAC Senior Research Scholar), and Pete Newell (Managing Partner BMNT Partners). In the class, students will apply the Lean Launchpad methodology to problems proposed or approved by Department of Defense/Intelligence Community sponsors. Some of the problems already approved include: Humanitarian Assistance / Disaster Relief Mobile and Web based App (National Defense University) Distributed, Disposable, Intelligence, Surveillance, and Reconnaissance (Commander US Navy 7th Fleet) Virtual Advice and Assistance Toolkit for IEDs (Joint Improvised Threat Defense Agency) Wearable Sensors and Apps for Divers (Naval Special Warfare Group 3) Interested in solving a problem not listed here but potentially related to the government or military? Contact the teaching team. To learn more, visit our website: [7]hacking4defense.stanford.edu To receive updates about upcoming info sessions and brown bag lunches. Join our [8]Facebook group or sign up on our [9]email list. -- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: [10]https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at [11]companys@stanford.edu. -- [12]Twitter | [13]LinkedIn | [14]GitHub | [15]TravisBiehn.com | [16]Google Plus References 1. http://hacking4defense.stanford.edu/dodic-problems.html 2. https://docs.google.com/spreadsheets/d/1oXvCSrFzr2PoIDvOmQPaloJN_JxXFpwXNFluYATTaFw/edit?usp=sharing 3. mailto:companys@stanford.edu 4. mailto:liberationtech@lists.stanford.edu 5. mailto:kdchang@stanford.edu 6. mailto:kdchang@stanford.edu 7. http://hacking4defense.stanford.edu/ 8. https://www.facebook.com/groups/1556101194680136/ 9. https://docs.google.com/forms/d/1ZHM-ahQGIIYRCxyS2aP0XgIHwG-NF7oDJuF3LiESQxk/viewform?usp=send_form 10. https://mailman.stanford.edu/mailman/listinfo/liberationtech 11. mailto:companys@stanford.edu 12. https://twitter.com/tbiehn 13. http://www.linkedin.com/in/travisbiehn 14. http://github.com/tbiehn 15. http://www.travisbiehn.com/ 16. https://plus.google.com/+TravisBiehn